©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Security for Today’s Threat Landscape Kat Pelak 1.
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
Website Hardening HUIT IT Security | Sep
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO twitter.com/LacoonSecurity.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
The Changing World of Endpoint Protection
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Winning with Check point
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Marin Frankovic Datacenter TSP
Synchronized Security Revolutionizing Advanced Threat Protection
Sky Advanced Threat Prevention
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Kaspersky Small Office Security INTRODUCING New for 2014!
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.
Artificial Intelligence. Real Threat Prevention.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Introducing Dell SonicWALL Capture Advanced Threat Protection Service
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Threat Management Server Eusebio Nieva Director Técnico Check Point España y Portugal.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Complete Cloud Security Anyone, anywhere, any app, any device.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Sophos Central for partners and customers: overview and new features
Predrag Spasic | Sales Manager Serbia and Macedonia
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Ilija Jovičić Sophos Consultant.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Hybrid Management and Security
Active Cyber Security, OnDemand
Jon Peppler, Menlo Security Channels
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
Secure once, run anywhere Simplify your security with Sophos
(With Hybrid Network Support)
The MobileIron® Threat Detection difference:
Information Protection
Threat Landscape Update
Information Protection
Presentation transcript:

©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION

©2015 Check Point Software Technologies Ltd. 2 TRUE STORY Electronics manufacturer with high volumes of IP Employees want to connect mobile devices to corporate apps to be more productive CISO: Not confident devices are secure

©2015 Check Point Software Technologies Ltd. 3 [Restricted] ONLY for designated groups and individuals The organization has 4-5% mobile infection and CISO now mandates all devices have mobile threat prevention. What threats did they find? What types of employees? How could they impact their business? ARE THEY SECURE? CISO turns to Check Point. The problem is more serious than they thought:

©2015 Check Point Software Technologies Ltd. 4 [Restricted] ONLY for designated groups and individuals EXECUTIVE HAS MAN-IN-THE-MIDDLE ATTACK WHILE AT CAFÉ. What could a cyber attacker do? Intercept VDI sessions Capture corporate s

©2015 Check Point Software Technologies Ltd. 5 [Restricted] ONLY for designated groups and individuals Steal username and password of VPN Extract data typed in corporate applications RESEARCHER HAS A CREDENTIAL STEALER ON HER DEVICE. What could a cyber attacker do?

©2015 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals BUSINESS MANAGER HAS A MALICIOUS APPLICATION. What could a cyber attacker do? Extract s, contacts, calendar Turn on microphone during strategic partner meeting

©2015 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 7 MOBILE THREATS are ESCALATING in frequency and sophistication 1 Source: Kindsight Security Labs Malware Report Source: Kaspersky IT Threat Evolution Q Report 3 Source: Check Point Targeted Attacks on Enterprise Mobile In the Enterprise: 50% chance you having 6 or more mobile targeted attacks 3 Sophistication of mobile threats on the rise: Ransomware, Masque Attack, Wirelurker. Pangu, Heartbleed, xSSer mRAT, and more 3.3x new malicious mobile programs were detected in Q than it did over the previous quarter. 15 million mobile devices infected with Malware 1

©2015 Check Point Software Technologies Ltd. 8 WHAT WE DON’T CONTROL? How to protect against

©2015 Check Point Software Technologies Ltd. 9 Mix of personal and business data Can’t control individuals’ behavior No protection from zero day or advanced threats MOBILE DEVICES Are difficult to control

©2015 Check Point Software Technologies Ltd. 10  Focused on device management  Provide only protection for known threats or app reputation  Limited protection from secure wrappers and containers Today’s solutions leave SECURITY GAPS.

©2015 Check Point Software Technologies Ltd. 11 Solving the Mobile Security Gap ADVANCED THREAT DETECTION AND MITIGATION Check Point Mobile Threat Prevention HIGHEST LEVEL OF SECURITY FOR IOS AND ANDROID FULL VISIBILITY BEST MOBILE THREAT CATCH RATE THREAT ANALYTICS REAL-TIME REMEDIATION OF THREATS SIMPLE DEPLOYMENT TRANSPARENT USER EXPERIENCE

©2015 Check Point Software Technologies Ltd. 12 [Restricted] ONLY for designated groups and individuals Highest Level of Mobile Security for the Enterprise The only solution providing advanced mobile threat detection across: Device (OS) Detecting attacks, vulnerabilities, configuration changes Applications Detecting malicious apps Network Detecting Man-in-the-Middle attacks

©2015 Check Point Software Technologies Ltd. 13 [Restricted] ONLY for designated groups and individuals HOW IT WORKS CLOUD-BASED RISK ASSESSMENT, THREAT DETECTION AND MITIGATION Agent runs in the background on device, sending risk data to Check Point Mobile Threat Prevention MTP analyzes device, apps and networks to detect attacks 3 MTP assigns a real-time risk score, identifying the threat level. 4 On Device Remediation Immediately Sent to User Risk-based Network Protection Real-time Intelligence & Control; MDM and SIEM integration 2 … DEVICE UNPROTECTED Threat Found Click to remove 1

©2015 Check Point Software Technologies Ltd. 14 Innovation Drives Industry’s Highest Mobile Threat Catch Rate [Restricted] ONLY for designated groups and individuals Advanced App Analysis Sandboxing (Emulation) Advanced Static Code Analysis Uncovers new malware and targeted exploits Network Wi-Fi Man-in-the-Middle (MitM) attacks Host Threat Analysis Malicious Configurations Exploits and file system manipulation Threat Framework Multi-dimensional Risk/Trust assessments Accurate risk classifications to effectively mitigate risk

©2015 Check Point Software Technologies Ltd. 15 Real time detection reporting and analysis with greater cross-platform mobile threat visibility and control SIMPLE DEPLOYMENT SIMPLE Easy to use and deploy SaaS platform SCALABLE Highly scalable with strong operational efficiencies INTELLIGENT Integration with MDM, SmartEvent, Incident response and more

©2015 Check Point Software Technologies Ltd. 16 USER EXPERIENCE Preserves user device experience, battery life, privacy Easily push lightweight agent to users through your MDM Amnon: Graphics is not consistent TRANSPARENT

©2015 Check Point Software Technologies Ltd. 17 Taking Mobile Security Beyond Mobile Threat Prevention [Restricted] ONLY for designated groups and individuals ​ Mobile Threat Prevention Threat Prevention for mobile devices Capsule Cloud Protect laptops when off the business network Capsule Workspace & Docs Protect business data on mobile devices Target solutions for mobile use-cases

©2015 Check Point Software Technologies Ltd. 18 ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Summary HIGHEST LEVEL OF SECURITY FULL MOBILE THREAT VISIBILITY AND INTELLIGENCE SIMPLE DEPLOYMENT CHECK POINT MOBILE THREATPREVENTION

©2015 Check Point Software Technologies Ltd. 19 ©2015 Check Point Software Technologies Ltd. THANK YOU [Restricted] ONLY for designated groups and individuals

©2015 Check Point Software Technologies Ltd. 20 [Restricted] ONLY for designated groups and individuals Pricing Per device license Package Per Device License (device / month) Mobile Threat Prevention$4 Package Per User License (user/ month) Mobile Threat Prevention$8 Per user license (3 devices)

©2015 Check Point Software Technologies Ltd. 21 Insertion PointMalware Network & Exploits Network Application based Threats ✓ Partial Network & OS based Threats ✓✓✓ Vulnerability Management ✓ Multi-Platform ✓✓✓ Partial Adaptive Mitigation ✓ Partial - Confidential and Proprietary - Competitive Analysis